Monday, October 19, 2015

Court ventures breach

One of the most idiotic data breaches occurred in October, 2013 when Court Ventures, a company owned by Experian credit reporting service, sold a Vietnamese identity theft group the records of over 200,000,000 million people.

Oops.

The Vietnamese group practiced identity theft, gathered records (including social security numbers), and then sold this info to people willing to buy that personal info.  Court Ventures didn't check into the legitimacy of the Vietnamese group before selling the info.  In other words, Court Ventures collected a lot of personal information from consumers, sold that information to a client in Vietnam, and that client in turn sold it to its clients who are buying it presumably for nefarious purposes.

The term "identity theft" usually implies that someone's information or identification is being stolen.  But what is it called when it's lawfully (if carelessly) sold to a person who shouldn't have it?  It's called a data breach.  Imagine having to tell over 200,000,000 people that although they entrusted you with their information on loan applications, credit checks, etc., you sold that information to what many would consider hackers.  That leaves the CEO in a very bad situation, even if he put himself there.

Granted, this was not a situation that involved hacking.  In my opinion, it's much worse.  Hacking is when someone has made at least a minimal effort to secure information that shouldn't be seen, but someone has been able to access that information anyway.  This is a situation where you have information that shouldn't be seen, but nobody has broken in.  Instead, the kind of people you want your information are being sold that exact information that they shouldn't see.  You not only weren't protected- your secret information was sold so that the company could profit, and they were so careless and greedy that they didn't care whether the information should be secret or not.


References:

McCandless, D. (2015, October 2). Ideas, issues, knowledge, data - visualized! Retrieved October 19, 2015, from http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

McCarthy, N. (2014, August 26). Chart: The Biggest Data Breaches in US History. Retrieved October 19, 2015, from http://www.forbes.com/sites/niallmccarthy/2014/08/26/chart-the-biggest-data-breaches-in-u-s-history/

Monday, October 12, 2015

Indiana University- Week Seven

Since I started this blog as part of an assignment for my Master's in Cybersecurity, I wanted to take a look at a data breach involving a University.  These aren't that prevalent, which is a good thing, but it leaves me curious why more colleges aren't hacked.  You have a large number of college students, most of them somewhere between frazzled and partying, and they've handed over an enormous amount of personal information to the University.  I hope that it's because in academic settings, more educated people are paying better attention to the data security, but I don't know if that's accurate or not.  Whatever the reason, it's a good thing more University hacks and breaches haven't occurred.

In 2014, about 146,000 students at Indiana University had their information, including social security numbers, exposed.  This wasn't a hack, but it was a data breach.  Here's the difference: a hack is someone trying to access information that's specifically been made unavailable to them.  It's the online equivalent of breaking and entering.  A data breach can certainly be a hack, but it's larger than that.  It includes accidental releases of info.  Here, the data was exposed because it was stored on an unencrypted area.  Search engines gathered the information (because that's what search engines do), and gained access to 146,000 student's records.  This info should have been encrypted and it's pretty easy to lay the blame on the university for not encrypting an area that should have been encrypted.

When I said above that a hack was the online equivalent of breaking and entering, this data breach was more like a person walking through a public area of a government building, picking up brochures.  Only, someone made a mistake and put confidential info into the brochure racks.  The person who got the information wasn't necessarily acting nefariously- they collected random info that they were told was available for them to collect.  But that info shouldn't have been in that rack for them to collect.

References:
 Wang, Stephanie. "Data Breach at Indiana U May Have Exposed Student SSNs." USA Today. Gannett, 26 Feb. 2014. Web. 12 Oct. 2015. <http://www.usatoday.com/story/news/nation/2014/02/26/indiana-university-data-breach/5830685/>. 

Monday, October 5, 2015

Beautiful interactive hack infographic- Week 6

This week, I wanted to step away from the topic of individual hacks and look at it from a higher level.  I discovered a website called "InformationIsBeautiful.net" that includes visualizations of lots of different kinds of data.  But there was one particular timeline of hacks that was especially good, and useful for the theme of this blog.  This timeline provides information about different hacks that have occurred.  It says when the hack occurred, gives a bit of information about the hack, compares it in size to other hacks, and even provides a link to an outside report where one can discover more information about that particular hack.  The thing I like best is that you can sort by industry and the method of leak.  For example, with only two clicks, I can easily discover that there was only one hack involving the retail industry that was an inside job.

This infographic has a lot of information, but it's presented in a really simple, uncomplicated manner.  By sorting different features, someone is able to parse what their particular industry should be most concerned about.

I think it's rare to stumble across information that presents so much in a very intuitive way.  Often, the more data that's included, the more complicated the site or graphic gets.  Being able to filter out the noise and present the information so simply is a definite boon to an information security professional.

References:
 Ideas, issues, knowledge, data - visualized! (n.d.). Retrieved October 5, 2015, from http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ 

Tuesday, September 29, 2015

Week 5- a followup to last week's discussion

This is somewhat of a followup to last week's discussion about the hack of US government data.  My particular area of expertise is in global data privacy law.  I wrote my thesis on "The Right to be Forgotten" which is a developing concept in Europe that gives normal individuals the right to have data that's irrelevant or untimely removed from the Internet.  I found an article that discusses data privacy legislation in the US, especially in the wake of the US government hack.  (Wyden, 2015)  I wanted to discuss this article in terms of what it got right and wrong.

The article was written by Senator Ron Wyden, a democrat.  He claims that in response to the hack of the US government, Congress has proposed a bill called the Cybersecurity Information Sharing Act (CISA) that would allow the US government to get private information from private companies.  Later in the article, he concedes that the bill isn't meant to do that- it's simply too broadly worded and would allow the NSA to snoop at unprecedented levels.  On this measure, it's hard to tell whether Senator Wyden got it right.  Is the bill worded that broadly- probably.  That doesn't mean it will make it into law in that version.  Will the NSA use bill to collect private data?  I'd like to say no, but I'm not sure I believe that.  They probably would, given their recent history of going even farther.

But there's one issue in particular, near the end of the article, that is dead wrong.  Senator Wyden states that the bill shouldn't toss aside "long established protections for Americans' privacy."  When I initially read the article, I was unaware that it was written by a US Senator.  I believed it was a piece by a staff writer at The Guardian, a newspaper in the UK.  Much of Europe has the right to privacy.  If you think about their history, it makes sense.  Put modern digital privacy rights in the context of WW2 Germany.  When people ask and collect data about you, it hasn't turned out well for them.  Meanwhile, in the US, we strongly favor free speech.  This free speech isn't absolute, but it is extremely broad.  We call it the "marketplace of ideas" and we would rather have lots of information so that the citizens can make up their own mind about an issue.  This has caused great divergence in terms of online privacy rights.  In Europe, you can remove information about yourself.  In the US, once it's on the Internet, it's likely to stay there.  The difficulty is that it's hard to draw borders online.
So why does his statement bother me?  Because it's simply wrong.  There is no right to privacy in the US Constitution.  The Supreme Court has said that a right to privacy exists in the "penumbra" of the First Amendment.  In particular, it extends to a couple being allowed to keep private whether or not they are choosing to have a child.  Family matters, in other words.  Other information is sensitive and must be kept guarded such as health information.  The law governs who can legally access such information and what they can do with it.  But it is a complete overstatement to say that Americans have the right to privacy.  As a Senator, I wish Wyden knew this.  Furthermore, I wish he wasn't fueling an already stoked fire between the US and Europe by presenting false facts in major newspapers.

References:
Wyden, R. (2015, July 29). Congress' fix for high-profile hacks is yet another way to grab your private data. Retrieved September 29, 2015, from http://www.theguardian.com/commentisfree/2015/jul/29/congress-stop-high-profile-hacks-reduce-your-privacy

Monday, September 21, 2015

Week 4- the government hack

In July, there was a high profile hack of government employee data.  I chose to write about this for a couple of reasons.  First, a friend of mine was affected (more below).  Second, it's pretty gutsy to hack the US government.

The hack itself started in May with an attack on 100,000 IRS records.  The hackers were able to get social security numbers, birthdays, and addresses.  By July, it spread throughout much of the government and to 22.1 million people that were affected.  Official sources have claimed China is at least partially responsible for the attack.

My friend worked for the IRS.  He got a letter from them saying that his information was taken.  We briefly discussed it and wondered what he was supposed to do about it.  He said that he hasn't worked there in about 4-5 years, and was surprised that they still had information on file for him.  

But it's bigger than one individual.  It takes a lot of guts to hack into the US government.  And I have a suspicion that might amplify this- I suspect that the two attacks are connected and it wasn't dealt with quickly enough the first time to shut down any opportunity they had the second time.  It's not uncommon for an attack to go quite some time before it's discovered.  Meanwhile, information continues to leak out.  With the bureaucracy of the government, I would not be surprised to find out that they either didn't discover the breach quickly, or they didn't act quickly.

References:
Mindock, C. (2015, July 9). US Government Cyber-Attacks Were Biggest In History, Follows Several High-Profile Hacks; 22.1 Million Files Compromised. Retrieved September 21, 2015, from http://www.ibtimes.com/us-government-cyber-attacks-were-biggest-history-follows-several-high-profile-hacks-2002565 

Monday, September 14, 2015

Sony- Week 3

The Sony hack last year (and early into this year) was interesting in a few respects.  It seems to be a lot like Stuxnet in the sense that there's a lot of legend surrounding this particular hack, and it's hard to separate out the legend from the fact.  

On November 25, 2014, a group calling themselves the Guardians of Peace (GOP) put some unreleased Sony movies online.  Almost immediately, there was speculation that North Korea was responsible.  Mind you- not North Korean hackers, but North Korea itself.  So why did people think a government would hack a US movie studio?  At the time, Sony was about to release a movie called "The Interview".  This comedy was about two news reporters who get a chance to interview Kim Jong Un, and the CIA asks them to carry out an assassination.  North Korea said that if the movie was released, they would consider it an act of war.  In fact, North Korea complained to the United Nations about the film, without specifically naming it.  Given the name of the group- Guardians of Peace- this almost made sense.  

The problem is, just five days after Sony was ready to pin everything on North Korea, the FBI said they cannot attribute it to North Korea.  But, three days later, Mike Rogers, the chairman of the House Intelligence Committee said that North Korea was responsible.  So, the question becomes whether he was relying upon incorrect initial reports, or whether the government intelligence community thought North Korea was responsible, changed their minds, and then changed them back (in the span of eight days).  

Meanwhile, many movie chains refused to release The Interview, possibly out of fear of being hacked themselves.  The movie suddenly became a pop phenomenon, and many people went to see it specifically because of all the attention surrounding the film.  I will hazard a guess that this movie would have easily flopped if the hack hadn't occurred; and if I was a more cynical person, I would write a Hollywood blockbuster where a movie studio hacks themselves to build hype for a movie that's certain to flop.

That being said, it's unlikely here.  Not only did the movie get released online, but so did a lot of employee personal data and emails.  Several executives had a series of uncomfortable emails released where they trashed various celebrities.  It's hard to get your talent to work with you if you've said some nasty things behind their back.

So who was really responsible for the hack?  That depends on who you ask.  Some are still pointing to North Korea.  Others are saying this is an inside job.  I tend to hold with RiskBasedSecurity in their "Attribution Bingo". I wonder if we can expand on the idea and make it Attribution Clue: North Korea via an insider threat trojan.  




References: 
A Breakdown and Analysis of the December, 2014 Sony Hack. (2014, December 5). Retrieved September 14, 2015, from https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack/ 

Tuesday, September 8, 2015

Stuxnet- Week Two

One of my favorite stories of cybersecurity gone wrong is the Stuxnet worm.  It's become the stuff of legend, and like a lot of legends, it has so many wild stories that it's hard to separate out what's true and what's fiction.

In early 2010, Iran is busy trying to enrich uranium for its nuclear facilities.  However, the centifuges keep failing at an unusual rate and nobody can quite figure out why.  Meanwhile, a computer security firm in Belarus finds that computers are rebooting for no known reason.  After some research, they discover that it's a computer worm. If you think about computer worms as being similar to "The Very Hungry Caterpillar," you're probably not too far off track.  They work their way through programs, eat everything in sight, and use all their newfound bulk to change or reproduce.

Some of the legends about Stuxnet are that it got into the Iranian nuclear facilities via a USB drive, and that it caused physical damage to the centrifuges, but told the scientists that everything is running fine.  Phrased differently, legend says that some idiot plugged in a thumb drive he shouldn't have, which put the virus onto the computers; and that once it was on the computers, a computer version of Ocean's 11 was being pulled off where things were blowing up in the lab while the scientists upstairs think everything is running fine.  This is a great story, it's just not entirely accurate.

There is evidence that the suppliers of key components were hacked- not a USB drive brought in.  I find this a much more likely scenario.  Say you want to break into the US government or a large, multinational corporation.  Those are big, difficult targets.  While it's hard to take them head-on, it's much easier to find a supplier that isn't doing things properly.  Attack the supplier, get access to the big target through them.

In addition, it's probably an overstatement to say that the Iranian scientists were completely unaware that there were problems.  As the article at Wired says, they noticed the centrifuges were failing at an unusual rate.  They just didn't know the cause of the failure.  That being said, it was unusual because it caused physical damage.  That's the part of Stuxnet that continues to fascinate me.  Most cyberattacks attack digital assets.  Those assets may have real world counterparts and cause damages because of the loss of value to the assets, but this is a computer worm that caused actual, physical damage.  By telling the centrifuges to spin at a different rate, they failed.  When the centrifuges fail, they cannot enrich uranium.  Without enriched uranium, the nuclear facilities were unable to function and it set it back years (or decades).

Recently, there have been reports that Stuxnet (or something very similar) was attempted against North Korea.  The fact that Stuxnet is still making news in 2015 is astounding to me.  While it's been discussed regularly, people are still trying to piece together the details of what happened (and continues to happen), and separate the facts from the myth.  While the myth is great and I'd love to imagine a story that's fit for a Hollywood blockbuster, the truth appears to be less complicated.  A supplier was attacked and it caused major problems.  When phrased like that, it's not too far removed from any other cyber attack.